Skip to Content
ISMSIncident Response

Incident Response

Security incident handling procedures for HealthTalk.

Incident Categories

CategoryDescriptionExample
SecurityUnauthorized access, malwareBrute force attack
PrivacyData breach, unauthorized disclosurePHI exposure
AvailabilityService outage, degradationSystem downtime
IntegrityData corruption, unauthorized modificationDatabase tampering

Severity Levels

LevelDescriptionResponse Time
CriticalActive breach, data exposureImmediate
HighPotential breach, significant risk1 hour
MediumContained incident, moderate risk4 hours
LowMinor issue, minimal risk24 hours

Response Process

1. Detection & Reporting

2. Triage

  • Assess severity and scope
  • Assign incident manager
  • Notify relevant stakeholders

3. Containment

  • Isolate affected systems
  • Preserve evidence
  • Prevent further damage

4. Eradication

  • Remove threat
  • Patch vulnerabilities
  • Verify clean state

5. Recovery

  • Restore services
  • Monitor for recurrence
  • Verify functionality

6. Post-Incident

  • Root cause analysis
  • Lessons learned
  • Process improvements
  • Update risk register

Notification Requirements

Internal Notification

  • Management: All High/Critical
  • Security team: All incidents
  • Affected teams: As relevant

External Notification

  • Data subjects: Within 72 hours (if required)
  • Regulators: Per legal requirements
  • Partners: Per contract terms

Documentation

All incidents documented with:

  • Timeline of events
  • Actions taken
  • Evidence preserved
  • Lessons learned
Last updated on